IB/hfi: Protect against writable mmap
The device/port status is not intended to be changed from user space. Prevent a user from mapping them as write or execute. Reviewed-by: Dennis Dalessandro <dennis.dalessandro@intel.com> Signed-off-by: Ira Weiny <ira.weiny@intel.com> Signed-off-by: Dennis Dalessandro <dennis.dalessandro@intel.com> Signed-off-by: Doug Ledford <dledford@redhat.com>
This commit is contained in:
Родитель
ee495ada5c
Коммит
1222026764
|
@ -597,6 +597,10 @@ static int hfi1_file_mmap(struct file *fp, struct vm_area_struct *vma)
|
|||
vmf = 1;
|
||||
break;
|
||||
case STATUS:
|
||||
if (flags & (unsigned long)(VM_WRITE | VM_EXEC)) {
|
||||
ret = -EPERM;
|
||||
goto done;
|
||||
}
|
||||
memaddr = kvirt_to_phys((void *)dd->status);
|
||||
memlen = PAGE_SIZE;
|
||||
flags |= VM_IO | VM_DONTEXPAND;
|
||||
|
|
Загрузка…
Ссылка в новой задаче